CVE-2026-22240

The vulnerability exists in BLUVOYIX due to an improper password storage implementation and subsequent exposure via unauthenticated APIs. An unauthenticated remote attacker could exploit this vulnerability by sending specially crafted HTTP requests to the vulnerable users API to retrieve the plaintext passwords of all user users. Successful exploitation of this vulnerability could allow the attacker to gain full access to customers' data and completely compromise the targeted platform by logging in using an exposed admin email address and password.
References
Link Resource
https://blusparkglobal.com/bluvoyix/ Product
Configurations

Configuration 1 (hide)

cpe:2.3:a:blusparkglobal:bluvoyix:-:*:*:*:*:*:*:*

History

02 Feb 2026, 15:50

Type Values Removed Values Added
First Time Blusparkglobal bluvoyix
Blusparkglobal
CPE cpe:2.3:a:blusparkglobal:bluvoyix:-:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
References () https://blusparkglobal.com/bluvoyix/ - () https://blusparkglobal.com/bluvoyix/ - Product

14 Jan 2026, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-14 15:16

Updated : 2026-02-02 15:50


NVD link : CVE-2026-22240

Mitre link : CVE-2026-22240

CVE.ORG link : CVE-2026-22240


JSON object : View

Products Affected

blusparkglobal

  • bluvoyix
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-312

Cleartext Storage of Sensitive Information

CWE-522

Insufficiently Protected Credentials